Integrating Wazuh with DefectDojo for DevSecOps

Integrating Wazuh with DefectDojo for DevSecOps

Post icon
/ Engineering
By

DevSecOps, which stands for Development, Security, and Operations, is a methodology that integrates security practices into the software development lifecycle. It emphasizes integrating security into every phase of the software development lifecycle rather than treating it as a separate or final step. By embedding security checks early,  DevSecOps detects vulnerabilities sooner. Integrating security into Continuous […]

Read more
Post icon
/ Engineering

Integrating Wazuh with DefectDojo for DevSecOps

By

DevSecOps, which stands for Development, Security, and Operations, is a methodology that integrates security practices into the software development lifecycle. It emphasizes integrating security into every phase of the software development lifecycle rather than treating it as a separate or final step. By embedding security checks early,  DevSecOps detects vulnerabilities sooner. Integrating security into Continuous […]

Read more
Detecting DeerStealer malware with Wazuh

Detecting DeerStealer malware with Wazuh

Post icon
/ Engineering
By

DeerStealer is a Windows-based stealer malware designed to steal sensitive user information, including login credentials, web browser data, and cryptocurrency wallet contents. It has similarities with other stealer malware like XFiles and Lummar. It is commonly spread through phishing emails and malvertising campaigns that appear trustworthy like the Google Authenticator incident. Upon infecting a system, […]

Read more
Post icon
/ Engineering

Detecting DeerStealer malware with Wazuh

By

DeerStealer is a Windows-based stealer malware designed to steal sensitive user information, including login credentials, web browser data, and cryptocurrency wallet contents. It has similarities with other stealer malware like XFiles and Lummar. It is commonly spread through phishing emails and malvertising campaigns that appear trustworthy like the Google Authenticator incident. Upon infecting a system, […]

Read more
BLX stealer detection and response using Wazuh

BLX stealer detection and response using Wazuh

Post icon
/ Engineering
By

BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations.  BLX Stealer is actively promoted on […]

Read more
Post icon
/ Engineering

BLX stealer detection and response using Wazuh

By

BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations.  BLX Stealer is actively promoted on […]

Read more
How Wazuh provides endpoint security without kernel-level access

How Wazuh provides endpoint security without kernel-level access

Post icon
/ Engineering
By

User mode and kernel mode are two operating states within a computer system that define different levels of access and control to the hardware resources of a computer. Choosing the right mode between the two is important, as it affects the security and stability of the computer.  User mode is a restricted operating environment where […]

Read more
Post icon
/ Engineering

How Wazuh provides endpoint security without kernel-level access

By

User mode and kernel mode are two operating states within a computer system that define different levels of access and control to the hardware resources of a computer. Choosing the right mode between the two is important, as it affects the security and stability of the computer.  User mode is a restricted operating environment where […]

Read more
Snake keylogger detection with Wazuh

Snake keylogger detection with Wazuh

Post icon
/ Engineering
By

Snake keylogger, also known as “404 Keylogger” or “KrakenKeylogger” is a .NET-based trojan designed to target Windows endpoints and steal sensitive information. It is typically spread through phishing campaigns and can exfiltrate saved credentials from web browsers, email clients, and other commonly used applications. In addition, it can capture keystrokes, screenshots, and data from the […]

Read more
Post icon
/ Engineering

Snake keylogger detection with Wazuh

By

Snake keylogger, also known as “404 Keylogger” or “KrakenKeylogger” is a .NET-based trojan designed to target Windows endpoints and steal sensitive information. It is typically spread through phishing campaigns and can exfiltrate saved credentials from web browsers, email clients, and other commonly used applications. In addition, it can capture keystrokes, screenshots, and data from the […]

Read more
Detecting PowerShell exploitation techniques in Windows using Wazuh

Detecting PowerShell exploitation techniques in Windows using Wazuh

Post icon
/ Engineering
By

PowerShell is a tool widely used for managing Windows endpoints. Its versatility makes it a key resource for administrators, allowing them to control various system functions, automate workflows, and manage configurations efficiently. The scripting capabilities of PowerShell enable users to perform tasks that would otherwise require multiple steps manually, saving time and reducing human error. […]

Read more
Post icon
/ Engineering

Detecting PowerShell exploitation techniques in Windows using Wazuh

By

PowerShell is a tool widely used for managing Windows endpoints. Its versatility makes it a key resource for administrators, allowing them to control various system functions, automate workflows, and manage configurations efficiently. The scripting capabilities of PowerShell enable users to perform tasks that would otherwise require multiple steps manually, saving time and reducing human error. […]

Read more
Detect and respond to BlackSuit ransomware with Wazuh

Detect and respond to BlackSuit ransomware with Wazuh

Post icon
/ Engineering
By

BlackSuit ransomware is a malicious software designed to infiltrate computer systems and encrypt critical data. It primarily targets high-value organizations across critical sectors showcasing its potential to disrupt operations and inflict widespread damage. This ransomware has caused substantial financial losses and operational disruptions across various industries. Understanding how BlackSuit operates and implementing detection strategies against […]

Read more
Post icon
/ Engineering

Detect and respond to BlackSuit ransomware with Wazuh

By

BlackSuit ransomware is a malicious software designed to infiltrate computer systems and encrypt critical data. It primarily targets high-value organizations across critical sectors showcasing its potential to disrupt operations and inflict widespread damage. This ransomware has caused substantial financial losses and operational disruptions across various industries. Understanding how BlackSuit operates and implementing detection strategies against […]

Read more
Integrating Bitdefender GravityZone with Wazuh

Integrating Bitdefender GravityZone with Wazuh

Post icon
/ Engineering
By

Organizations face increasingly sophisticated threats that require a proactive and multi-layered defense strategy. Organizations often leverage multiple security solutions to improve their security posture. Centralized visibility for organizations that use multiple security solutions is essential for operational efficiency. Wazuh, an open source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) platform […]

Read more
Post icon
/ Engineering

Integrating Bitdefender GravityZone with Wazuh

By

Organizations face increasingly sophisticated threats that require a proactive and multi-layered defense strategy. Organizations often leverage multiple security solutions to improve their security posture. Centralized visibility for organizations that use multiple security solutions is essential for operational efficiency. Wazuh, an open source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) platform […]

Read more
Detecting malicious URLs using Wazuh and URLhaus

Detecting malicious URLs using Wazuh and URLhaus

Post icon
/ Engineering
By and

URLhaus is a project operated by abuse.ch. The purpose of the project is to collect, track, and share malware URLs, to help network administrators and security analysts protect their networks from cyber threats. URLhaus also offers an API to query information about malicious URLs. Integrating this API with Wazuh can help organizations improve their ability […]

Read more
Post icon
/ Engineering

Detecting malicious URLs using Wazuh and URLhaus

By and

URLhaus is a project operated by abuse.ch. The purpose of the project is to collect, track, and share malware URLs, to help network administrators and security analysts protect their networks from cyber threats. URLhaus also offers an API to query information about malicious URLs. Integrating this API with Wazuh can help organizations improve their ability […]

Read more
Snapekit detection with Wazuh

Snapekit detection with Wazuh

Post icon
/ Engineering
By

The Snapekit rootkit was reported by Gen Threat Labs on X (formerly Twitter) on October 2, 2024. They identified several behavioral patterns of the rootkit. At the time of writing, all publicly available Snapekit samples specifically target Arch Linux (6.10.2-arch1-1 x86_64). However, the rootkit can be easily adapted to impact other versions of Arch Linux […]

Read more
Post icon
/ Engineering

Snapekit detection with Wazuh

By

The Snapekit rootkit was reported by Gen Threat Labs on X (formerly Twitter) on October 2, 2024. They identified several behavioral patterns of the rootkit. At the time of writing, all publicly available Snapekit samples specifically target Arch Linux (6.10.2-arch1-1 x86_64). However, the rootkit can be easily adapted to impact other versions of Arch Linux […]

Read more
Detecting and responding to Lumma Stealer with Wazuh

Detecting and responding to Lumma Stealer with Wazuh

Post icon
/ Engineering
By

Lumma Stealer, also known as LummaC2 Stealer, is a customizable malware written in C/C++ that allows for efficient and low-level access to system resources. It uses extensive obfuscation and anti-analysis features, making it highly effective and hard to detect. It is distributed as a Malware-as-a-Service (MaaS) model, with several plans available on underground forums and […]

Read more
Post icon
/ Engineering

Detecting and responding to Lumma Stealer with Wazuh

By

Lumma Stealer, also known as LummaC2 Stealer, is a customizable malware written in C/C++ that allows for efficient and low-level access to system resources. It uses extensive obfuscation and anti-analysis features, making it highly effective and hard to detect. It is distributed as a Malware-as-a-Service (MaaS) model, with several plans available on underground forums and […]

Read more
Ransomware protection on Windows with Wazuh

Ransomware protection on Windows with Wazuh

Post icon
/ Engineering
By

Providing Ransomware protection on our endpoints is important as these attacks have become one of the most prevalent and damaging cyber threats faced by organizations and individuals. These types of attacks continue to rise due to the lucrative nature of ransom payments. Ransomware attacks adopt sophisticated techniques, such as advanced encryption algorithms and social engineering […]

Read more
Post icon
/ Engineering

Ransomware protection on Windows with Wazuh

By

Providing Ransomware protection on our endpoints is important as these attacks have become one of the most prevalent and damaging cyber threats faced by organizations and individuals. These types of attacks continue to rise due to the lucrative nature of ransom payments. Ransomware attacks adopt sophisticated techniques, such as advanced encryption algorithms and social engineering […]

Read more
Keep up to date
with our digest of articles